Impact
In OpenClaw versions prior to 2026.2.19 the tools.exec.safeBins component contains an input validation bypass. The bypass allows attackers who already have command execution privileges to use the sort -o flag to write arbitrary files or the grep -R flag to read files recursively, thereby escaping the intended stdin‑only restriction. This weakness is a form of OS command injection (CWE‑78) that can lead to unintended filesystem modifications or data exfiltration.
Affected Systems
The vulnerability affects all OpenClaw products deployed before version 2026.2.19, as identified by the vendor database. The affected software runs on Node.js environments and is enumerated as cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*. Any installations in this configuration are vulnerable unless updated to 2026.2.19 or later.
Risk and Exploitability
The CVSS score of 2.0 indicates low severity; the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker already have command execution capability on the target system. Therefore the threat is limited to scenarios where command execution is possible, and no public exploitation or widespread active attacks are reported. The risk is considered low for systems that are already securely configured, but unpatched systems that have exposed command execution paths remain vulnerable.
OpenCVE Enrichment
Github GHSA